\u000A\u000A\u000A\u000A#var_dump(\u0024_SERVER);\u000A// 优化后的代码\u000A\u0024queryString = \u0024_SERVER["QUERY_STRING"];\u000A\u0024requestUri = \u0024_SERVER["REQUEST_URI"];\u000A\u0024scriptName = \u0024_SERVER["SCRIPT_NAME"];\u000A\u0024replacement = str_replace(\u0024requestUri, '', \u0024scriptName);\u000A\u000Aecho "" . PHP_EOL;\u000Aecho "" . PHP_EOL;\u000Aecho "" . PHP_EOL;\u000Aecho "" . PHP_EOL;\u000A#var_dump(\u0024_SERVER); PHP $_SERVER 变量解析:QUERY_STRING、REQUEST_URI、SCRIPT_NAME

原文地址: https://www.cveoy.top/t/topic/pCHA 著作权归作者所有。请勿转载和采集!

免费AI点我,无需注册和登录